Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

The cybersecurity controls used to manage an organization’s cybersecurity program in previous years will not work against bad actors targeting networks today. Organizations rely more on cloud computing technology, connecting their sensitive data to more third party networks and in turn expanding their attack surface.

This blog starts with the basics as part of a series regarding operational security, such as web application headers and defenses against attacks such as cross-site scripting (XSS), cross-site request forgery (CSRF), and vulnerabilities in included libraries.

How Bitsight leadership has set up and run a workable AI Council balancing innovation through the use of AI with being a cybersecurity risk management firm.

Our response to CVEs within the CUPS printing system, where several critical vulnerabilities were identified.

Phishing kits are easy to access on the cyber underground, making attacks simpler than ever. Learn how these tools work and how to defend against them.

By being aware of the pitfalls & embracing best practices for threat intelligence programs, organizations can achieve both cybersecurity & business goals.

AI is reshaping threat intelligence, redefining how we gather and analyze data. Explore the rise of AI-driven threat intelligence and its security impact.

A chief information security officer (CISO)'s roles and responsibilities include many hats in the realm of cybersecurity — but they are primarily responsible for translating complex business problems into effective information security controls.

AI tools like DALL-E & ChatGPT went mainstream in 2022, sparking creativity—and security concerns. Explore their impact & how threat actors may exploit them.

Doxing, once a gaming tactic, now targets public figures. After the Dobbs ruling, 5 Supreme Court justices were doxed. Learn how it happens & how to stay safe.

Is there a difference between cybersecurity vs. information security? Learn more about the distinctions between the two areas, where they overlap, and how both have evolved.

Balancing data flow & security is crucial as file sharing grows. Learn how file hosting services help protect digital assets while enabling access.

On the cyber underground, threat actors seek to profit fraudulently from the e-commerce boom. In particular, a tactic called refunding is growing in popularity.

The vendor due diligence checklist to steer your procurement decision-making in 5 simple steps. First step: always collect the 7 basic business details.

Here are five questions you should ask yourself as part of your morning cybersecurity checklist that will help to protect your organization.